Re: Crypto Map Question [7:27909]

2001-12-02 Thread Jim Gillen
Hunt Dynamic crypto maps are used when we don't know ahead of time some of the parameters for the SA or IKE associations to be made. This would be the case if someone is ringing in from home and it is not a device (router, firewall) to device(router, firewall) situation where the parameters can b

RE: Crypto Map Question [7:27909]

2001-12-01 Thread Matthew Crane
OK it all depends on when you use dynamic crypto maps and the rule is that dynamic maps are used for remote users who need occasional access and for whom you do not have all the necessary information to create a staic crypto map, sich as IP address. So a. You always create dynamic crypto maps w

Crypto Map Question [7:27909]

2001-12-01 Thread Hunt Lee
I am very confused with the following Crypto Map question: In the MCNS book (by Cisco Press), it said that if a static crypto map entry sees outbound IP traffic that should be protected and the crypto map specifies the use of IKE, then a Security Assoication is negotiated with the remote peer acc